SugarGh0st RAT Used to Target American Artificial Intelligence Experts


Proofpoint recently identified a SugarGh0st RAT campaign targeting organizations in the United States involved in artificial intelligence efforts, including those in academia, private industry, and government service.

Proofpoint tracks the cluster responsible for this activity as UNK_SweetSpecter. SugarGh0st RAT is a remote access trojan, and is a customized variant of Gh0stRAT, an older commodity trojan typically used by Chinese-speaking threat actors. SugarGh0st RAT has been historically used to target users in Central and East Asia, as first reported by Cisco Talos in November 2023.

Read more…
Source: ProofPoint


Sign up for our Newsletter


Related:

  • Treason charges against Russian cyber experts linked to seven-year-old accusation

    February 26, 2017

    Treason charges brought in December against two Russian state security officers and a cyber-security expert in Moscow relate to allegations made by a Russian businessman seven years ago, according to the businessman and a source connected with the investigation. They said the arrests concern allegations that the suspects passed secrets to U.S. firm Verisign and other ...

  • Second FSB Agent Arrested for Treason Revealed as Notorious Hacker

    January 27, 2017

    Major Dmitry Dokuchaev, one of four cyber-security experts arrested by the Kremlin on charges of treason, has allegedly been revealed as an infamous Russian hacker. Dokuchaev worked as a hacker under the alias “Forb” until Russia’s Federal Security Service (FSB) threatened to jail him, an unverified source told the RBC newspaper. “Forb” gave a interview to Russian ...

  • Greenbug cyberespionage group targeting Middle East, possible links to Shamoon

    January 23, 2017

    Symantec is currently investigating reports of yet another new attack in the Middle East involving the destructive disk-wiping malware used by the Shamoon group (W32.Disttrack, W32.Disttrack.B). Similar to previous attacks, the Disttrack malware used by Shamoon is just the destructive payload. It required other means to be deployed on targeted organizations’ networks and is configured ...

  • Court Documents Reveal How Feds Spied On Connected Cars For 15 Years

    January 16, 2017

    It’s not always necessary to break into your computer or smartphone to spy on you. Today all are day-to-day devices are becoming more connected to networks than ever to add convenience and ease to daily activities. But here’s what we forget: These connected devices can be turned against us because we are giving companies, hackers, and ...